Critical Vulnerability Information CVE Number: CVE-2016-0777 and CVE-2016-0778 Subject: Vulnerabilities in OpenSSH Client as Reported in Qualys Security Advisory Vulnerability Description: - The vulnerability involves a downgrade from untrusted X11 forwarding to trusted forwarding when the X server has disabled the SECURITY extension; reported by Thomas Hoger. Fix Details: - Fix code provided at: https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c - Related bug reports and discussions: https://bugzilla.redhat.com/show_bug.cgi?id=1298741 and https://bugzilla.redhat.com/show_bug.cgi?id=1298741#c4 - Developers noted that openssh-7.1p2 does not fully resolve the issue; a complete fix will be included in future versions. Additional Vulnerability: - Exploiting CVE-2016-1908, attackers may gain remote access to the X server with higher privilege levels than intended. Source and Authentication Message ID: Date: Fri, 15 Jan 2016 13:32:42 -0500 (EST) From: cve-assign@mitre.org To: Multiple security-related mailing lists and individuals CC: Relevant security personnel and organizations CVE Assignment Team: MITRE CVE Numbering Authority PGP Signature: PGP signature provided to ensure message authenticity.